Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 23:37
Static task
static1
Behavioral task
behavioral1
Sample
4396e2efd1ba81c16d9ae61fd298b7bf_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4396e2efd1ba81c16d9ae61fd298b7bf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4396e2efd1ba81c16d9ae61fd298b7bf_JaffaCakes118.html
-
Size
12KB
-
MD5
4396e2efd1ba81c16d9ae61fd298b7bf
-
SHA1
ae99d166ccb24f87a5e789a80ac0dddb4ff2543f
-
SHA256
95ff13bc541b9679f7c12ba7664f685d38d3f1cce21c4eb436ed95dc30e74ce3
-
SHA512
5bd5a2fda48afdff417fcd9f2e37ce253488030a740d0f46996a49b96a7643c1c44109a7cbbbb29a9440a251f9985c6ffb42c3758da371abfedd0bc7f3165670
-
SSDEEP
384:77SB3PkEVqATYTnFHTSKeVKFTZKeVKiAXFlnH:PSBlYTnFzSKwKhZKwKL1V
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421891729" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5451581-124A-11EF-97A3-C6E8F1D2B27D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501c80ca57a6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000f2acd3f50be657ee664f317ca4814e6dfacda7a258e760e6d6218f97b2472594000000000e80000000020000200000009251b57698686c7bf2f3086bd1e7924221820b8057a6e8d8fb10dfff769fa23d20000000b58e5d2de0832af83b071609af1cfe24ecf4d550f46ae2b5d657f155ae421b2a40000000e555fdad067f0cc11bf3e1d6322273703451bf34a7a98fff737279d168bc374666b7e3e32c6defbc150b07e78ecb4891d41d62d5c6dc962e9af6dfd473e6abb5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2412 2420 iexplore.exe 28 PID 2420 wrote to memory of 2412 2420 iexplore.exe 28 PID 2420 wrote to memory of 2412 2420 iexplore.exe 28 PID 2420 wrote to memory of 2412 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4396e2efd1ba81c16d9ae61fd298b7bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556092203c453d15800af71beff1c21b0
SHA177a5e60bd20281633ce43df10d6c60314f200d6e
SHA2562030977aaa6a9276249e6402f75da5b27ff676f9951dd9b92c44fedcdd5f26a4
SHA512aebee621e0ada41aa02b49fbcbfc3064282bb2b9c4558f4c35e4315f88a3481717bab100eee82a465052587144480345aaddca36c04fc1e34b9de3d3bc1b5869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59727c64a9fe14fb70949477e06a84867
SHA17ecd1ff319e464845edcb44c1a9d87ec6eb42a96
SHA256f3e92c40ed025b2d311e950c2b0b4a12cbdf71733f85d57a5facf284d24b61da
SHA512de3e2a970b75d115db8813b6823f2c5c9666c56db4430180d1a2f05ef5ac8b82ca44c078d2e53760db5f957efd59ba5c06f862658263e826e93f4820a547ff2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb1f1e4f2f3a608d5e23d3f9bcf2b14c
SHA1f4e92c4cd37f8b8df625c1dc1447510eb8a59579
SHA256acb1d692323f7601ca511be125670554cd42ee4aa9009d25d8b341bfc7735599
SHA5121cfd73f2683756b8f4f854a00973293c3201fa49f21815d89aa2183eec98673f7da62282a2095e2fdcca14e8c55ac6f7b1f38c859930bddf6e0ff8580a16e727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5befc19e626150369706def42220a07c8
SHA100d4362567af2f7372ceb77773bbd9c874485cad
SHA25689782b9848c0a2335c175cbdcbebd13e71ff532bb52d6c5d85da5ffb7d9094b8
SHA5124e2be96f8064f41da9d160eafd5fd1ef2c6ba8524389f8454bd584c7310399c49569fd3004e334dbd047aa970047ece766f2749a8402bc457cfe06fd50cf5fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54840dc41fc93adab7c8af565d9e636e2
SHA1c475982c5aae02eac30fe50c85a8442e44718dad
SHA2561098b67cfe698d4d6c18b358ef9b61a748a99aa423feaa58ab6e8c7e11ad56c5
SHA512654c0051d480c2bea8714cb813a09dd87d105acfaed67e1b6206817affe68724f93189e82fd57ec013d5dee1cacf3f868db31eaa8f91f8a38da891815d572956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51194daf743a462b73191fa8a5d4438b3
SHA193bd7d7ec21dce0c5eaba911ff8187f2d503d42e
SHA25618776e09cb371b9abd379f777f0629ba0da75c1d1f66b92904c05a83ade8c1ad
SHA512d53ef5a35f9d950686fcf4e8480ce7dc226a4bb9af34ac8f1c5b4b2b4c366a25435eb631e2f7b2a574c08e20ccb2025de68addf25301c4b3f5bf52c23d6d4694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c59fd87766e59b556658de84bba24bb6
SHA11089c7184bdb811c4027597f3c7d88af79600169
SHA256be911037f71e7442f7e596085024af20f2af133e963d456120a499cb24501f37
SHA5121c6cd78dbe731a693b121b126d75c24b70451b6c178178677dadb89e159ae7cfebe62a325a6f4c5e3a81b8b478a15ef0f76b400a8a28bccdef7c9c72d73382d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bbef1bdea34e67ee1c32aea84eb345a
SHA13a4247930728a73bbacb83925c25c027727427b5
SHA2569ce5d0bd6e5655c9ecca9479fc1bdefeb26371131e6635d2fd0908c649f0bde5
SHA51260cfd0b77fd4f945d0e3e65ab6c8c399bcec0384899bee0f3f4184b34062d437075098d3087f63c096adbd34751dc5b84c2e65319c553cca7dbfc01271c6f1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8d0b15e75abfbc7b7206473b2633351
SHA14a239467d1426c9e2571d39aa0841031bb515b89
SHA2569b91a4faed1973d6421e52408c7f7840d999e69544df2da9e84659203120f71e
SHA5126143c1e7ec0d02a381c826067938a9e985b7e77637b3d518883fc0cea7e59c96029a14083d42cd011eee13a06d77c79c2a53927bc4a3834feb396f036b842cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c4fa7baa1c459c503f50d19f2c0da66
SHA18845f1dc7414d32abd36da3133e0ca00120cd08a
SHA25674ccc1d5ebac59d96c14c29c05bf5f15b608beb74da0c1a8916c0586a67e409a
SHA512cb913ed9ddce0d8082cc1fa3eb6ffc68396d661de73709a803a637baf33b8a228b02877630f3ee0a976bbe2ab4902416154cda4bc4952fb9878999555b959895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529f811fdfc6dae9a4c75b9683d4e4ca6
SHA107ff40d01b439b4351ae8a438bd06a7a2948cad2
SHA256cf3b115731df875d09dc7373e3f6fe3ed55d4f4185081954561368c02f9417db
SHA5128968a645e9ccd7a18385927b8b9ee67c1fd08f390f626d729885348597f952a336e8e68e68f8f9582cb688f5cd68245b08bcdcfc1f6d0bfb21aaf140917993e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c06ccdada8075d1c97fb1b3deec30f8a
SHA15eca2bf6e05dbe0dbf35fdef71c26443276f6ef7
SHA2568f8724b573d257fe5ffd79d903280a3aa4393f99c8a3f6129b37c6cfa80bba45
SHA512eb8b1212d83a76435daec4cf960ef4d2a8d7415bce2c51f04fa3999480e434d86f99935f20f31011ea2ffb3ff4338f1691714d9514c1f94ea42ea1e9f3dd1183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57017a03cc616d72b36b8e5469835d0f0
SHA1bb23745a734262d4a1ede13b86013f64f1fc8ec4
SHA25632c944c7cdc3d0245a560bd6a1fb5390c435ff970507eeaa6fa0b524e7ef475c
SHA512fa4ca2788b901928f9af6854bb144b8a6c6e69498ac4a831bb015beb860b1ec710d88eeaae0f1684a1daa98027cde079815646343a1de8867b149c32a7bb5364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535f0ce2a878f330cf09bebeabd42942a
SHA15cac33744373351ff2719b1cc54a8b54ffbbff68
SHA2566c3c7b4f7251f4aabaaa23d83c755f55dcd4ee1c026ac781d7d48127297b1b53
SHA512a6e0c326c39d19ecdaf00934f52736f875592d7fdcdd1763bf693ce841ce6bacf8d591eba5fe6d628ac37e7a60937badd7c9d4a9777bf86d4a14b30837047d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffb3a7bc0e41ad9c05e2c4efdf27c507
SHA1ea5da97f28c4252aaa9c44c41c8cda00574a0147
SHA256a3ff27c030fc867589a354fc233a466b0a43bf6dc9d7c1da73cebfd1ebfd6772
SHA512a89dad414e510da038c7b31e38b370170cff8ce257fccfb73572030a45c75eacd1270de0d4880103b21ba838f7e0d5e14778e6c17e4978bef7b64fdce6ec9e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d3ff0de07561302913cad910747d170
SHA1b16ebb65ba9766cd20638abbe877ea8dc7f7e4a4
SHA25650e8e77c93114823b6e2d58a06bd07637c82480eac75956f9cefcd6073b04ca2
SHA512c7ef91286f687b1734206765807718a3b7fdb257c26d37025163fd62e48c13fee4fb0e088fe264bbc8fddbd195df4f18ef4411e2d18f086d7f74b38362f5b741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b27809fd6ead17d818d1e058cc924a3a
SHA173dddd2f6c49185e0c7a492158787fa2e82e9a43
SHA2563117d501f288eeb973ed0327262447cc7df87978605cd295a1ddfe85f7ad4ac2
SHA5120310f34addb9a940fa208fd11f3aea36f732cfedb3f0669e88af4253757ef3978ea2a94030ce974e688b55d70f75d979f01f57e6823304c0bebc6f84c0b31e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5298f8cee3cc49c159f41dafae2fdba19
SHA1917236fd164553c1baf3f924fd2d73cfcffc0ea8
SHA25678353fcf03a8c3f8bf6dff9c88c8c7eee0a7988bf37387889a14fa16fdd56e53
SHA512dee41c4ba39e54febf3bab7c2ad07bc7d9148576f23bad8e3bfacd77c1ad548896439dfacb6d70c9c30b3b8fd1cef6f6abc9814d6ac52e93130f858b4abf6148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4d5907821e798da8937ac7d55437d3e
SHA15e92d442eb92b6210ad9e84f8029732db8bb271c
SHA256c1b5c5457a5b9b3c94ac78958ff59f07222b1e6213bb7d2d821fb71262954fd8
SHA512b1ff33b0a2907f03c6ebbeb624842f5ce90839ba76f445e765d90c54a8224b9ebaeda68614cd11627d41252f1495dc35c0de5f323e55d772d9b672b6332b4506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53637a098c8f165f87424cc8804c6325a
SHA16061d5a822697afbb9dc68e14f0ea722e5430f85
SHA256f16a751162087cab3f309b6f2425cc40ea403920e462280c1e8ec4cbf99670d7
SHA51213e4550da90decfbe39d89353d830e22266f40e313743eeb4ee16cc71acb029e43472d14ee85840dd4861c6efe8c928eb6872276d88af37ab80c1a747f6c2bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531ce312a8995fc9990d87aaeced7f46f
SHA1edeea4fa60d7623a0f8d9ae89830fc55be2a55af
SHA256dc63215dc5947e515c2cfca66a24aecca10e3fb5806b529aa58537291bcba900
SHA512f457980853a2cad26583f5f7b721f0e893f095beac815f084d273ad9d24acec07479417d67d12196b9b4efd83077ee001fc93929474427cda84c8fc7eec8b7ae
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a